article thumbnail

GUEST ESSAY: A Memorial Day call to upskill more veterans for in-demand cybersecurity roles

The Last Watchdog

Meanwhile, 200,000 well-trained and technically skilled military service members are discharged each year. Yet, there’s still work to be done to make this path more accessible and known among the veteran and transitioning military community. This experience can also be helpful when training cybersecurity talent.

article thumbnail

News alert: MxD roundtable with White House officials highlights cybersecurity workforce needs

The Last Watchdog

Also in attendance were Access Living, The College of Lake County, CyberSkills2Work, and Task Force Movement. Each participating organization is committed to developing cyber skills and programs to train the workforce across a wide range of industries, including manufacturing. Funding for this program is in part from a Federal grant.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Catches of the Month: Phishing Scams for March 2022

IT Governance

The Ukrainian government and its military were targeted by DDoS (distributed denial-of-service) attacks, while a pro-Ukrainian group attacked the Belarusian railway system with ransomware after discovering that it was being used by Russia to transport tanks and weapons. Beware of remote access takeover scams.

Phishing 144
article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

My reporting trip included meetings with Michigan-based cybersecurity vendors pursuing leading-edge innovations, as well as a tour of a number of thriving public-private cybersecurity incubator and training programs. The first Cyber Range training and testing hub opened at Eastern Michigan University in late 2012. They answered, yes.

article thumbnail

US Govt kicked off ‘Hack the Army 3.0’ bug bounty program

Security Affairs

US army asked participants to test more than 60 publicly accessible web assets, including *.army.mil, “By ‘crowdsourcing’ solutions with the help of the world’s best military and civilian ethical hackers, we complement our existing security measures and provide an additional means to identify and fix vulnerabilities.

Military 135
article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

Cyber criminals have discovered Zoom logons, in particular, to be useful for carrying out credential stuffing campaigns to probe for deeper access inside of breached networks. To make an impact, they must be able to address the audience in accessible business language and in risk language.

Security 309
article thumbnail

GUEST ESSAY: Theft of MQ-9 Reaper docs highlights need to better protect ‘high-value assets’

The Last Watchdog

military information for sale on the Dark Web for a nominal sum, in and of itself, is unfortunate and unremarkable. The Insikt Group determined that the hacker/seller must have accessed a Netgear router with misconfigured FTP login credentials. The discovery of sensitive U.S. The discussion revolves around securing DoD HVAs.

Military 145